Tag Archives: Security Management

Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness Burcu Bulgurcu and researchers from the Saunders School of Business at the University of British Colombia looked into the problem of employees not complying with security policy. Security policy is (generally) put in place to protect the company from attacks directed …

Today’s automobile contains a myriad of computers. While this advancement allows automobile to be more efficient and safer, that comes with new potentials risks. It is not clear if, by making car safer while using computers, automobile manufacturers thought about those computers becoming a threat if used maliciously. In this landmark research, Karl Kosher et …

Rowhammer attacks are really interesting. They uses some of the physical properties of how computer memory is designed to overcome the logical control of how it is used. The bits of information are stored so close together in modern memory that if you ‘wiggle’ one bit fast enough, sometimes the ones next to it flip …

Presented by Dr. Israat Haque at the 2018 Atlantic Security Conference Software Defined Network (SDN) is a new approach of designing networks. In SDN architecture network control function is decoupled from hardware like routers and switches. This decoupled control function is executed in a logically centralized controller with a global network view. Furthermore, SDN brings …

Luigi Logrippo at the Université du Québec en Outaouais presents the importance of multi-level access control methods for access control, data secrecy and data privacy. They suggest that an access control system that intends to provide secrecy and privacy must implement a multi-level access control method. In a system with data that is secret and …

At the upper end of security practices there is isolation. Disconnecting a computer from the network and of course the Internet provides a layer of physical control to system access. This air-gap is used to provide a barrier to information theft on individual computers and networks that contain very sensitive data by militaries and organisations. …

Presented by Dr. Ashraf Matrawy at the SERENE-RISC workshop 2017, April. For economic, technical, and environmental reasons, there is a very strong trend towards virtualizing computing infrastructures and relying less on private computing infrastructures. This trend utilizes information infrastructures that are built using virtualization techniques while taking advantage of very rapid advances in networking technologies. In …

Power Projection in the Digital Age: The Only Winning Move is to Play General Darren W. McDew, USAF, is the Commander of U.S. Transportation Command (USTRANSCOM), the Command responsible for the transportation for the US Department of Defence. He provides an interesting insight into the importance of cybersecurity to the capabilities of the modern military. Information …